Malware

Win32/AutoRun.VB.ADA (file analysis)

Malware Removal

The Win32/AutoRun.VB.ADA is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Win32/AutoRun.VB.ADA virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • Drops a binary and executes it
  • Authenticode signature is invalid
  • Behavioural detection: Injection (inter-process)
  • CAPE detected the embedded pe malware family
  • Anomalous binary characteristics
  • Attempts to modify Explorer settings to prevent hidden files from being displayed
  • Yara detections observed in process dumps, payloads or dropped files

How to determine Win32/AutoRun.VB.ADA?


File Info:

name: 07F4BBF18F4E26B87FC1.mlw
path: /opt/CAPEv2/storage/binaries/01076eea833d737ee8d0ef08716bdbb2cd9b337e908f137bb728ab1d645faf18
crc32: 06EF2B64
md5: 07f4bbf18f4e26b87fc1d6f6914da602
sha1: 4236749f777d7960ba2048973a89a732035186e0
sha256: 01076eea833d737ee8d0ef08716bdbb2cd9b337e908f137bb728ab1d645faf18
sha512: 9bc4754e6836a42f6fe9779d0ce39c535eace8fb77efb0204628a71daa33494637e3e3cf915d2663fd70c9dc7c1b58036b1c515fab5c225c8bf6287d1f2b4576
ssdeep: 12288:y4StR6p+sWYKYyNUmAv7b4aPb4OWHcQ2:y9stROU4aP+c
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T178849941B590E63BE002E4F27955C29B26513D7346A0ACA3BBC50F1B55B02E7BEF0B5B
sha3_384: 46624177a42e85673afd62a6472f4dd634c2c8a2f37a5b2ff85595f7dd3323384fb3753075f3cc5cdd72614ec2264a5d
ep_bytes: 68685e4000e8eeffffff000000000000
timestamp: 2011-03-29 05:37:01

Version Info:

Translation: 0x0409 0x04b0
ProductName: NaHkFdYvBVoGgIkuymmnpstgPC
FileVersion: 1.00
ProductVersion: 1.00
InternalName: AjbMrrchtBCGJW
OriginalFilename: AjbMrrchtBCGJW.exe

Win32/AutoRun.VB.ADA also known as:

BkavW32.AIDetectMalware
Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.VBKrypt.55
FireEyeGeneric.mg.07f4bbf18f4e26b8
CAT-QuickHealTrojan.Vobfus.gen
SkyhighBehavesLike.Win32.VBObfus.fm
ALYacGen:Variant.VBKrypt.55
MalwarebytesGeneric.Malware.AI.DDS
VIPREGen:Variant.VBKrypt.55
SangforSuspicious.Win32.Save.vb
K7AntiVirusNetWorm ( 700000151 )
K7GWNetWorm ( 700000151 )
CrowdStrikewin/malicious_confidence_100% (D)
BaiduWin32.Worm.Autorun.l
VirITWorm.Win32.WBNA.NL
SymantecW32.Changeup!gen10
ESET-NOD32Win32/AutoRun.VB.ADA
APEXMalicious
ClamAVWin.Trojan.Changeup-6169544-0
KasperskyWorm.Win32.WBNA.nl
BitDefenderGen:Variant.VBKrypt.55
NANO-AntivirusTrojan.Win32.WBNA.dxmotm
TencentWorm.Win32.Wbna.ye
TACHYONWorm/W32.VB-WBNA.405504
EmsisoftGen:Variant.VBKrypt.55 (B)
F-SecureTrojan:W32/Injector.F
DrWebTrojan.VbCrypt.60
SophosMal/SillyFDC-M
IkarusWorm.Win32.Vobfus
VaristW32/Vobfus.P.gen!Eldorado
AviraTR/Dropper.Gen
Antiy-AVLWorm/Win32.WBNA.gen
ArcabitTrojan.VBKrypt.55
ViRobotWorm.Win32.A.WBNA.405504
ZoneAlarmWorm.Win32.WBNA.nl
GDataGen:Variant.VBKrypt.55
CynetMalicious (score: 100)
AhnLab-V3Trojan/Win32.Tdss.R7739
BitDefenderThetaAI:Packer.11A8DF1A21
MAXmalware (ai score=83)
VBA32BScope.Worm.WBNA
Cylanceunsafe
PandaW32/VobfusLNK.A
TrendMicro-HouseCallWORM_VB.SMXJ
RisingTrojan.Win32.VBCode.fld (CLASSIC)
YandexTrojan.GenAsa!K2HG1HjyWwE
SentinelOneStatic AI – Malicious PE
FortinetW32/Generic.AP.1735EB4!tr
Cybereasonmalicious.18f4e2
DeepInstinctMALICIOUS
alibabacloudTrojan.Win.UnkAgent

How to remove Win32/AutoRun.VB.ADA?

Win32/AutoRun.VB.ADA removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment